OSINT Team

We teach OSINT from multiple perspectives. InfoSec experts, journalists, law enforcement and other intelligence specialists read us to grow their skills faster.

Follow publication

Member-only story

Extract all Bug Bounty programs

AbhirupKonwar
OSINT Team
Published in
2 min read3 days ago

Photo by Tarik Haiga on Unsplash

Bounty targets from Bugcrowd, HackerOne, Federacy, Intigriti & Yeswehack

⚙️ Source by Arkadiy Tetelman

📥Download all the domains currently available

wget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/refs/heads/main/data/domains.txt

⌛Filter main domains

cat domains.txt | awk -F '.' '{print $(NF-1)"."$NF}' | grep -Eo '([a-zA-Z0-9-]+\.)+[a-zA-Z]{2,}' | sort -u > main_domains

⏳Filter IP addresses

grep -Eo '\b([0-9]{1,3}\.){3}[0-9]{1,3}\b' domains.txt > ips.txt

That’s it, now perform mass recon and hunting 🤡

  • Fuzz for only one particular path or endpoint that is not well known in public wordlists but you came to know it.
  • Private nuclei templates.
  • Pick only one bug and find on all programs based on whatever your methodology is for it. Forexample, only RXSS or scanning only one port number on all programs that you are well aware of is easily or mostly misconfigured by sysadmins and you can easily show the exploitation of it as well for POC purposes to get triaged quickly.

Commits History of asset updates🗳️

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in OSINT Team

We teach OSINT from multiple perspectives. InfoSec experts, journalists, law enforcement and other intelligence specialists read us to grow their skills faster.

Write a response